Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare - one in which a digital attack can have the same destructive capability as a megaton bomb.

Future Crimes: A Journey to the Dark Side of Technology - and How to Survive It

The New York Times best seller. Technological advances have benefited our world in immeasurable ways, but there is an ominous flipside. Criminals are often the earliest and most innovative adopters of technology, and modern times have led to modern crimes. Today's criminals are stealing identities, draining online bank accounts, and wiping out computer servers.

Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World

In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies-and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.

The Black Door: Spies, Secret Intelligence and British Prime Ministers

The Black Door explores the evolving relationship between successive British Prime Ministers and the intelligence agencies, from Asquith's Secret Service Bureau to Cameron's National Security Council. At the beginning of the 20th Century the British intelligence system was underfunded and lacked influence in government. But as the new millennium dawned, intelligence had become so integral to policy that it was used to make the case for war.

Hackers: Heroes of the Computer Revolution: 25th Anniversary Edition

Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying

This manual will give you the incognito tools that'll make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive...and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll grow a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online.

The Dark Net

The Dark Net is not a separate realm but one that stretches from popular social media sites to the most secretive corners of the deep web. It is a world that is rarely out of the news but one that is little understood - and almost never explored. In The Dark Net, Jamie Bartlett presents a revelatory portrait of the internet's strangest subcultures: of trolls, drug dealers, hackers and political extremists.

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State

In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security....

Social Engineering: The Art of Human Hacking

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the Science & Technology behind them to unraveled the mystery in social engineering. Kevin Mitnick - one of the most famous social engineers in the world - popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password than to exert the effort of hacking.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Cyberspace is the 21st century's greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.

Unleashing Demons: The Inside Story of Brexit

As David Cameron's director of politics and communications, Craig Oliver was in the room at every key moment during the EU referendum - the biggest political event in the UK since World War II. Craig Oliver worked with all the players, including David Cameron, George Osbourne, Barack Obama, Angela Merkel, Jeremy Corbyn, Boris Johnson, Michael Gove, Theresa May and Peter Mandelson.

The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency

No one has ever written the history of the Defense Department's most secret, most powerful, and most controversial military science R&D agency. In the first-ever history of the organization, New York Times best-selling author Annie Jacobsen draws on inside sources, exclusive interviews, private documents, and declassified memos to paint a picture of DARPA, or "the Pentagon's brain", from its Cold War inception in 1958 to the present.

Spam Nation: The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door

In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies - and countless viruses, phishing, and spyware attacks - he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.

The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.

NSA Secrets: Governent Spying in the Internet Age

The NSA's extensive surveillance program has riveted America as the public questions the threats to their privacy. As reported by The Washington Post, in their Pulitzer Prize-winning coverage of whistleblower Edward Snowden's NSA leaks, NSA Secrets delves into the shadowy world of information gathering, exposing how data about you is being gathered every day. From his earliest encrypted exchanges with reporters, Edward Snowden knew he was a man in danger.

CYBERPUNK: Outlaws and Hackers on the Computer Frontier, Revised

Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find - everything from bank accounts to military secrets. In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.

Worm: The First Digital World War

Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide. When Conficker was unleashed in November 2008, cybersecurity experts did not know what to make of it. Exploiting security flaws in Microsoft Windows, it grew at an astonishingly rapid rate, infecting millions of computers around the world within weeks.

The Cost of War

Tony Blair's decision to back George W. Bush in his attack on Iraq will go down as a defining moment for Blair - and for Britain. As Ambassador to the UN, Sir Jeremy Greenstock was centre stage in the dramatic months leading up to the Iraq War. After the war he was Special Envoy for Iraq, the UK's highest authority on the ground, and he worked side by side with Paul Bremer, the US administrator of the Coalition Provisional Authority, in Baghdad and saw firsthand the impact of the divisive turf wars back in Washington.

Electronic Dreams: How 1980s Britain Learned to Love the Computer

In Electronic Dreams, Tom Lean tells the story of how computers invaded British homes for the first time, as people set aside their worries of electronic brains and Big Brother and embraced the wonder technology of the 1980s. This book charts the history of the rise and fall of the home computer, the family of futuristic and quirky machines that took computing from the realm of science and science fiction to being a user-friendly domestic technology.

Rise of the Robots: Technology and the Threat of a Jobless Future

In a world of self-driving cars and big data, smart algorithms and Siri, we know that artificial intelligence is getting smarter every day. Though all these nifty devices and programs might make our lives easier, they're also well on their way to making "good" jobs obsolete. A computer winning Jeopardy might seem like a trivial, if impressive, feat, but the same technology is making paralegals redundant as it undertakes electronic discovery and is soon to do the same for radiologists.

DarkMarket: CyberThieves, CyberCops and You

The benefits of living in a digital, globalised society are enormous; so too are the dangers. The world has become a law enforcer's nightmare and every criminal's dream. We bank online, shop online, date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security - sharing our thoughts, beliefs and the details of our daily lives with anyone who cares to relieve us of them?

Epic Win for Anonymous: How 4chan's Army Conquered the Web

4chan is the "Anti-Facebook", a site that radically encourages anonymity. It spawned the hacktivist group Anonymous, which famously defended WikiLeaks founder Julian Assange by bringing down MasterCard's and Visa's Web sites. Created by a 15-year-old wunderkind in 2003, it is the creative force behind "the Web's most infectious memes and catchphrases" (Wired). Today it has over 12 million monthly users, with enormous social influence to match.

Publisher's Summary

Today's National Security Agency is the largest, most costly, and most technologically advanced spy organization the world has ever known. It is also the most intrusive, secretly filtering millions of phone calls and e-mails an hour in the United States and around the world. Half a million people live on its watch list, and the number grows by the thousands every month. Has America become a surveillance state?

In The Shadow Factory, James Bamford, the foremost expert on the National Security Agency, charts its transformation since 9/11, as the legendary code breakers turned their ears away from outside enemies, such as the Soviet Union, and inward to enemies whose communications increasingly crisscross America.

Fast-paced and riveting, The Shadow Factory is about a world unseen by Americans without the highest security clearances. But it is a world in which even their most intimate whispers may no longer be private.

if you weren't paranoid before this book you will be after it.this book in detail sheds light on just what lenghths the government goes to in order to collect data and erode personal privacy in the name of security. . listened to it straight through couldn't stop

0 of 0 people found this review helpful

Johanna

31/08/14

Overall

Performance

Story

"does not work"

This book wasn’t for you, but who do you think might enjoy it more?

nobody because it doesn't work

What was most disappointing about James Bamford’s story?

that i bought the audiobook and could not hear it

0 of 2 people found this review helpful

Report Inappropriate Content

If you find this review inappropriate and think it should be removed from our site, let us know. This report will be reviewed by Audible and we will take appropriate action.